General

  • Target

    300-59-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    ce6badaafe3fa625f3661bb91d73d966

  • SHA1

    a1ad9061c808377ea2c7e85a53370dea65a0674b

  • SHA256

    1f92c15704b8a0b21f36570633470e0b84d0f11c31dce98c2b4239d5f5083e43

  • SHA512

    b69f1df5572a0426e7c758d6d9eaafef6629cac8fefd40e980a82cb391a12a196c22b79d04e7e4c18c632a0b3f607e3ac7748c5d370e861e92a43d41d9ad75fa

  • SSDEEP

    1536:Bpaiq0I2XvL/5kVvpyITHAOEH8pIZ+msXvsfJre8oJ1C:BpaikE/5SppIZ+m2sfJrebJ

Score
10/10

Malware Config

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 300-59-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections